Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Cybersecurity
Computer Networking
How Things Work: An Introduction to Physics
End of Life Care: Challenges and Innovation
Understanding Medical Research: Your Facebook Friend is Wrong
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore public key cryptography fundamentals, including motivation, system patterns, intuition, construction, security models, and noncommitting encryption techniques.
Explore symmetric key cryptography, focusing on Even Monsoon tweaking, nonlinear mixing, and tight security analysis for cryptographic schemes.
Explore cryptanalysis techniques, including SMD solvers and QA methods, with expert insights and discussions on notations and applications.
Explore post-quantum cryptography, its importance in the face of quantum computing threats, and potential solutions for securing digital communications in the future.
Explores advanced cryptographic techniques for secure attribute-based encryption in arithmetic branching programs, focusing on adaptive security and efficiency improvements.
Explore secret sharing and coding techniques, including linear and arithmetic schemes, graphical chain methods, and replica encoding for secure data distribution.
Explore super invertible matrices, hyperinvertible mappings, and their applications in cryptography, including randomness generation and secure multiparty computation.
Explore zero knowledge proofs, non-interactive arguments, and witness hiding in cryptography. Covers key concepts, barriers, and new definitions in this advanced cryptographic topic.
Explore succinct arguments, proof carrying data, and verification techniques in cryptography. Learn about linear and batch verification methods for enhanced security protocols.
Explore oblivious structures, key-exchange protocols, and secure group messaging techniques. Gain insights into cryptographic concepts and their practical applications in communication systems.
Explore cryptanalysis techniques for hash functions, PRFs, and PRGs, covering attacks, round functions, and search methods for enhanced security understanding.
Explore NIST's lightweight cryptography standardization, focusing on WAGE, Estate, Spook, and Jambu algorithms, with insights on quantum attacks and mixed-fit permutations.
Explore authenticated encryption, including combiners, fast decryption, and sponge-type security. Learn about plaintext release and engage in Q&A sessions.
Explore SCA countermeasures, security evaluation techniques, and noise reduction in preprocessing. Learn about joint work and the Fennel approach to enhance cryptographic system protection.
Explore lattice-based cryptography, focusing on NewHope algorithm, hardware designs, and optimizations for post-quantum cryptography implementation.
Get personalized course recommendations, track subjects and courses with reminders, and more.